Social computing is a rapidly growing and constantly evolving technology that is aimed at increasing communication, encouraging collaboration, and enhancing productivity among people and resources. Social computing applications or Web 2.0 are built on a range of advanced and supporting technologies that enhance collective action and interaction which currently dominates the Web (Parameswaran & Whinston 2007).
Social computing applications are categorized into social media, social bookmarking, and social networks categories as identified by the continuing Web 2.0 trend (Schwartz et al. 2009; Amer-Yahia, 2009). Each of these categories has been embodied by various social software and web sites. Some of the best-known and equally famous social web sites that dominate the web are Facebook, YouTube, Twitter, Wikipedia, Delicious, and LinkedIn.
This document outlines the schedule and content for Session Three of a collaboration and networking event. The session will cover social media values, networks, and platforms. It will also discuss collaboration tools in social networking contexts and the ethics of data collection. The schedule includes an activity where participants will discuss situations requiring networking and collaboration. There will also be discussions on social networking theory and a case study example before concluding with an open question lunch.
This presentation was developed to help a client address best practices for building an online community within the workplace. It was based upon a great deal of research and study of the topic and should help those who are seeking information or wish to start an online community, as it pulls together a great amount of data and resources on the topic.
Konnect: MindTree's Social Computing Platformkhan_sultan
People can ask
questions to Konnect's
intelligent assistant directly
from within Outlook.
Submit: People can submit
ideas, documents, blog posts
or discussions directly from
within Outlook.
Tag: People can tag emails
and content for future
reference and retrieval.
This plug-in allows seamless
integration of Konnect's
capabilities within Outlook
without having to switch
between applications.
Konnect for MS-Office Applications (Word, Excel & PowerPoint)
While reviewing a proposal document or reading that important design document or presentation and you wish to:
- Search for related content from within the organization
- Ask a question to subject matter experts
IE Masters in Management Admissions Presentationsahaana7
This is my presentation for the Masters in Management program at IE business school. This is my topic : How do you imagine social interaction within 10 years, taking into consideration the impact of technology on human relations?
The document discusses social collaboration using HyperOffice Social. It introduces social collaboration as applying social media concepts to core business problems like collaboration. HyperOffice Social achieves a balance between collaboration tools and social media by combining their benefits, allowing structured business data and conversations while encouraging sharing. The software's features include social messaging, activity walls, and attaching business documents and records to conversations for context.
Intranets - Vision, Approach and Best Practices by Optimus BTOptimus BT
This presentation outlines some of the best practices that Optimus BT has seen in its 100+ implementations. The vision, design, features, and functionality outline the industry best practices for Intranet implementations.
The document discusses the benefits of a Web Community developed by Altran for their customers. It allows for social networking, networking, and promotional channels. Key features include sharing content, messaging other members, web meetings, and accessing a document repository. The community aims to improve digital marketing strategies by allowing brand and product monitoring, knowledge management across devices, and generating self-content from consumers to gain insights into their interests and needs.
This presentation showcases how Web 2.0 could be used within an enterprise with a "day (weeks, actually) in the life of" story of how a new employee, Michael, uses web 2.0 (or Enterprise 2.0) tools to quickly get up to speed and start contibuting. Touches on social networking, social bookmarking, blogs / microblogs, wiki, virtual world, mashups, RSS
This document outlines the schedule and content for Session Three of a collaboration and networking event. The session will cover social media values, networks, and platforms. It will also discuss collaboration tools in social networking contexts and the ethics of data collection. The schedule includes an activity where participants will discuss situations requiring networking and collaboration. There will also be discussions on social networking theory and a case study example before concluding with an open question lunch.
This presentation was developed to help a client address best practices for building an online community within the workplace. It was based upon a great deal of research and study of the topic and should help those who are seeking information or wish to start an online community, as it pulls together a great amount of data and resources on the topic.
Konnect: MindTree's Social Computing Platformkhan_sultan
People can ask
questions to Konnect's
intelligent assistant directly
from within Outlook.
Submit: People can submit
ideas, documents, blog posts
or discussions directly from
within Outlook.
Tag: People can tag emails
and content for future
reference and retrieval.
This plug-in allows seamless
integration of Konnect's
capabilities within Outlook
without having to switch
between applications.
Konnect for MS-Office Applications (Word, Excel & PowerPoint)
While reviewing a proposal document or reading that important design document or presentation and you wish to:
- Search for related content from within the organization
- Ask a question to subject matter experts
IE Masters in Management Admissions Presentationsahaana7
This is my presentation for the Masters in Management program at IE business school. This is my topic : How do you imagine social interaction within 10 years, taking into consideration the impact of technology on human relations?
The document discusses social collaboration using HyperOffice Social. It introduces social collaboration as applying social media concepts to core business problems like collaboration. HyperOffice Social achieves a balance between collaboration tools and social media by combining their benefits, allowing structured business data and conversations while encouraging sharing. The software's features include social messaging, activity walls, and attaching business documents and records to conversations for context.
Intranets - Vision, Approach and Best Practices by Optimus BTOptimus BT
This presentation outlines some of the best practices that Optimus BT has seen in its 100+ implementations. The vision, design, features, and functionality outline the industry best practices for Intranet implementations.
The document discusses the benefits of a Web Community developed by Altran for their customers. It allows for social networking, networking, and promotional channels. Key features include sharing content, messaging other members, web meetings, and accessing a document repository. The community aims to improve digital marketing strategies by allowing brand and product monitoring, knowledge management across devices, and generating self-content from consumers to gain insights into their interests and needs.
This presentation showcases how Web 2.0 could be used within an enterprise with a "day (weeks, actually) in the life of" story of how a new employee, Michael, uses web 2.0 (or Enterprise 2.0) tools to quickly get up to speed and start contibuting. Touches on social networking, social bookmarking, blogs / microblogs, wiki, virtual world, mashups, RSS
Companies benefit from Web 2.0 investmentSustainly
The latest research from Deutsche Bank shows that 20% of US and European companies use social media channels for business purposes. But, these are only the most transparent companies. More DB research can be found at: www.dbresearch.com
This document discusses using social media and Enterprise 2.0 tools for collaboration. It begins by asking which social media platforms people use like Twitter, LinkedIn, Facebook. It then discusses how these platforms and others like YouTube, Wikipedia can be used both personally and professionally. It focuses on how Enterprise 2.0 uses these same tools internally for engagement, communication, innovation and knowledge sharing among employees, customers and partners to increase productivity, collaboration and business agility.
The document discusses how the Collins Center staff can utilize virtual leadership and web 2.0 tools to improve collaboration, disseminate information, and solve problems both internally and externally. It provides examples of current web 2.0 uses including websites, videos, and social media. It also discusses how to measure the ROI of social media through exposure, engagement, influence, and actions taken. The retreat aims to explore how to better position staff as virtual leaders and use online communities and tools.
The document discusses online identity management and social media influence. It is a presentation by Fady Ramzy, country manager of Interact Egypt. It covers topics like online identity, online reputation management, measuring social media influence, and using networks like Twitter and Facebook to boost influence. The goal is to help people better understand and manage their online identities and presence on social media.
This document summarizes trends and best practices in adopting social media, or Web 2.0, technologies in organizations in 2008. Key findings include that employers are increasingly allowing social media use for business purposes, finding benefits like improved branding and communication, and are taking steps to integrate these technologies into their corporate culture. Some organizations create internal communities to foster knowledge sharing and collaboration among employees, while others focus on external-facing communities to engage customers. Best practices for organizations include encouraging participation, managing communities with appropriate oversight, and using wikis more for internal audiences.
SharePoint voor de social enterprise erwin koensErwin Koens
Gebruikers verwachten van hun samenwerkingsplatform ‘op kantoor’ dat ze ermee op een vergelijkbare, net zo intuïtieve manier als in hun privéleven interactie kunnen hebben met collega’s, partners en opdrachtgevers. SharePoint biedt hiervoor uitgebreide mogelijkheden. Deze sessie laat zien hoe een goed doordachte SharePoint implementatie uw intranet en/of extranet kan omturnen tot een waar Social Enterprise platform. Daarnaast verneem je meer over de aanpak, de implementatie en de adoptie van social functionaliteiten binnen de organisatie.
This document discusses the concepts of Web 2.0, Web 3.0, semantics, ontologies, and collective intelligence. It provides examples of tagging and folksonomies in Web 2.0 and describes how Web 3.0 seeks to enable automatic agents to interact and exchange information intelligently using semantics and ontologies. The document also discusses challenges in building social computing applications and content repositories that facilitate collaboration and knowledge sharing within online communities.
This document summarizes key topics from a lecture on intranets, extranets, cloud computing, Web 2.0, and social networks. It defines intranets and extranets, describes some principles of cloud computing including software as a service, and explains how Web 2.0 enables user-generated content and user interaction through applications like blogs, wikis, social media, and content sharing sites. It also discusses some social aspects of Web 2.0 like value and cooperation through user participation.
Wikis are websites that allow users to easily add and edit content. They are well-suited for collaborative knowledge building from a variety of user inputs. In contrast, blogs are better for communicating chronological data from one source to many users. Wikis have been used by businesses for project management and collaboration. Mass collaboration on the internet, enabled by technologies like wikis, blogs and social networks, is empowering crowdsourced solutions and transforming how businesses operate.
The document describes potential uses of social software within a business environment using IBM Lotus Connections. It discusses how profiles can be used to find expertise within an organization. Bookmarks and communities are presented as ways to discover and share knowledge. Activities, files, and wikis are highlighted as tools to collaborate on work and organize information. Finally, the document outlines considerations for deploying Lotus Connections at different scales, from a pilot to an enterprise-wide implementation.
Facebook collects extensive personal data on its users through their activities and interactions on the platform. This "digital dossier" is used to target personalized ads and content to users. While Facebook aims to create an open environment for sharing, some argue this level of data collection and use impacts individual privacy and autonomy. There is an ongoing debate around balancing user rights, platform policies, and responsibilities in the online space.
The Art of Socializing, Mobilizing, Localizing, & Monetizing: An Outlook on L...Sohag Sarkar
The paper analyzes the immense popularity of social media over mobile devices and prospects the new theme of location based mobile - social networking.
Social Business with Drupal @DrupalCon 2012 Ulf Sthamer
The document discusses social intranets and Drupal Commons. It outlines five main use cases for social intranets: static intranet, dashboard/homepage, profile and networking, group and project rooms, and mobile devices. It then examines how Drupal Commons supports each use case out of the box and areas that could be improved. The discussion focuses on search, hierarchical structures, group permissions, project management, and flexible group layouts.
Aiim Webinar Helen Mitchell Unified Search Final 7 21 2010Helen Mitchell
The document discusses search technologies and strategies for providing a unified view of private and public information across an organization. It covers definitions of key search concepts, challenges of information overload, examples of enterprise search, federated search, vertical search and summarization tools, as well as best practices and technologies to consider for unified search.
ADTELLIGENCE_White Paper_Monetization of Social Networks_Chapter2ADTELLIGENCE GmbH
The document discusses the global market for social networks. It notes that six of the top 15 websites in the world are social networks, and that social networks have grown faster than other types of websites. In Germany, over half of the top 15 sites are social networks as well. The largest social networks worldwide are dominated by US and Chinese sites like Facebook, QQ, and Baidu Space. In Germany, "student directory" networks like StudiVZ and SchülerVZ are most popular, along with Facebook. Asia also has significant social networks that have arisen independently due to cultural differences from Western sites.
The document provides guidelines for developing effective social media policies for companies and employees. It discusses balancing open communication with protecting proprietary information. It also emphasizes the importance of an inclusive process to create guidelines that reflect the organization's culture. The document details Cision's process for creating their social media guidelines and the nine guidelines they developed, which focus on transparency, professionalism, respect, and protecting confidential information.
This document discusses building a social portal using IBM Portal and Connections. It describes how a social portal can provide a consistent user experience, act as a collaboration hub by surfacing social content from Connections, and display appropriate social content contextually to users. Key benefits of a social portal include faster responses to customers/employees, knowledge sharing and usage, increased customer loyalty and engagement, easier access for new users through communities, and improved productivity. The document outlines how IBM Portal provides dynamic, personalized multichannel web experiences while IBM Connections enables social collaboration through features like profiles, communities, files, and activities. Together they can power a contextual, socially-infused, personalized portal.
The next generation of collaborative work will be defined by a shift from information handling to interaction management and socialization. Social software seems an unlikely example for enterprise collaboration initially, but networks allow tapping into collective coworker knowledge better than previous approaches. Communities form organically in social networks, connections are stronger, and adoption is faster due to ease of use. While past technologies like groupware and portals improved collaboration, social software facilitates user-driven interaction and knowledge-sharing.
Montressa L. Washington gave a presentation on using crowdsourcing, collaboration and Web 2.0 tools to enhance project management. She discussed how Enterprise 2.0 allows for new collaboration patterns through tools like wikis, blogs and social networks. Examples were given of how crowdsourcing, collaboration and social media can be used in project management, such as using ideation platforms for crowdsourcing ideas and online communities to facilitate collaboration. Web 2.0 tools like social bookmarks and profiles can also help with knowledge sharing and finding expertise.
The document introduces government agencies to the opportunities and best practices of using social media, also known as Web 2.0. It explains that social media allows two-way engagement with target communities rather than just targeting audiences. It provides examples of popular social media tools like blogs, wikis, Facebook, YouTube and Twitter. Early government adopters have learned that agencies should use social media to strategically engage citizens, address misinformation, and share content in digestible formats. Building online communities requires a long-term commitment beyond one-off experiments.
Companies benefit from Web 2.0 investmentSustainly
The latest research from Deutsche Bank shows that 20% of US and European companies use social media channels for business purposes. But, these are only the most transparent companies. More DB research can be found at: www.dbresearch.com
This document discusses using social media and Enterprise 2.0 tools for collaboration. It begins by asking which social media platforms people use like Twitter, LinkedIn, Facebook. It then discusses how these platforms and others like YouTube, Wikipedia can be used both personally and professionally. It focuses on how Enterprise 2.0 uses these same tools internally for engagement, communication, innovation and knowledge sharing among employees, customers and partners to increase productivity, collaboration and business agility.
The document discusses how the Collins Center staff can utilize virtual leadership and web 2.0 tools to improve collaboration, disseminate information, and solve problems both internally and externally. It provides examples of current web 2.0 uses including websites, videos, and social media. It also discusses how to measure the ROI of social media through exposure, engagement, influence, and actions taken. The retreat aims to explore how to better position staff as virtual leaders and use online communities and tools.
The document discusses online identity management and social media influence. It is a presentation by Fady Ramzy, country manager of Interact Egypt. It covers topics like online identity, online reputation management, measuring social media influence, and using networks like Twitter and Facebook to boost influence. The goal is to help people better understand and manage their online identities and presence on social media.
This document summarizes trends and best practices in adopting social media, or Web 2.0, technologies in organizations in 2008. Key findings include that employers are increasingly allowing social media use for business purposes, finding benefits like improved branding and communication, and are taking steps to integrate these technologies into their corporate culture. Some organizations create internal communities to foster knowledge sharing and collaboration among employees, while others focus on external-facing communities to engage customers. Best practices for organizations include encouraging participation, managing communities with appropriate oversight, and using wikis more for internal audiences.
SharePoint voor de social enterprise erwin koensErwin Koens
Gebruikers verwachten van hun samenwerkingsplatform ‘op kantoor’ dat ze ermee op een vergelijkbare, net zo intuïtieve manier als in hun privéleven interactie kunnen hebben met collega’s, partners en opdrachtgevers. SharePoint biedt hiervoor uitgebreide mogelijkheden. Deze sessie laat zien hoe een goed doordachte SharePoint implementatie uw intranet en/of extranet kan omturnen tot een waar Social Enterprise platform. Daarnaast verneem je meer over de aanpak, de implementatie en de adoptie van social functionaliteiten binnen de organisatie.
This document discusses the concepts of Web 2.0, Web 3.0, semantics, ontologies, and collective intelligence. It provides examples of tagging and folksonomies in Web 2.0 and describes how Web 3.0 seeks to enable automatic agents to interact and exchange information intelligently using semantics and ontologies. The document also discusses challenges in building social computing applications and content repositories that facilitate collaboration and knowledge sharing within online communities.
This document summarizes key topics from a lecture on intranets, extranets, cloud computing, Web 2.0, and social networks. It defines intranets and extranets, describes some principles of cloud computing including software as a service, and explains how Web 2.0 enables user-generated content and user interaction through applications like blogs, wikis, social media, and content sharing sites. It also discusses some social aspects of Web 2.0 like value and cooperation through user participation.
Wikis are websites that allow users to easily add and edit content. They are well-suited for collaborative knowledge building from a variety of user inputs. In contrast, blogs are better for communicating chronological data from one source to many users. Wikis have been used by businesses for project management and collaboration. Mass collaboration on the internet, enabled by technologies like wikis, blogs and social networks, is empowering crowdsourced solutions and transforming how businesses operate.
The document describes potential uses of social software within a business environment using IBM Lotus Connections. It discusses how profiles can be used to find expertise within an organization. Bookmarks and communities are presented as ways to discover and share knowledge. Activities, files, and wikis are highlighted as tools to collaborate on work and organize information. Finally, the document outlines considerations for deploying Lotus Connections at different scales, from a pilot to an enterprise-wide implementation.
Facebook collects extensive personal data on its users through their activities and interactions on the platform. This "digital dossier" is used to target personalized ads and content to users. While Facebook aims to create an open environment for sharing, some argue this level of data collection and use impacts individual privacy and autonomy. There is an ongoing debate around balancing user rights, platform policies, and responsibilities in the online space.
The Art of Socializing, Mobilizing, Localizing, & Monetizing: An Outlook on L...Sohag Sarkar
The paper analyzes the immense popularity of social media over mobile devices and prospects the new theme of location based mobile - social networking.
Social Business with Drupal @DrupalCon 2012 Ulf Sthamer
The document discusses social intranets and Drupal Commons. It outlines five main use cases for social intranets: static intranet, dashboard/homepage, profile and networking, group and project rooms, and mobile devices. It then examines how Drupal Commons supports each use case out of the box and areas that could be improved. The discussion focuses on search, hierarchical structures, group permissions, project management, and flexible group layouts.
Aiim Webinar Helen Mitchell Unified Search Final 7 21 2010Helen Mitchell
The document discusses search technologies and strategies for providing a unified view of private and public information across an organization. It covers definitions of key search concepts, challenges of information overload, examples of enterprise search, federated search, vertical search and summarization tools, as well as best practices and technologies to consider for unified search.
ADTELLIGENCE_White Paper_Monetization of Social Networks_Chapter2ADTELLIGENCE GmbH
The document discusses the global market for social networks. It notes that six of the top 15 websites in the world are social networks, and that social networks have grown faster than other types of websites. In Germany, over half of the top 15 sites are social networks as well. The largest social networks worldwide are dominated by US and Chinese sites like Facebook, QQ, and Baidu Space. In Germany, "student directory" networks like StudiVZ and SchülerVZ are most popular, along with Facebook. Asia also has significant social networks that have arisen independently due to cultural differences from Western sites.
The document provides guidelines for developing effective social media policies for companies and employees. It discusses balancing open communication with protecting proprietary information. It also emphasizes the importance of an inclusive process to create guidelines that reflect the organization's culture. The document details Cision's process for creating their social media guidelines and the nine guidelines they developed, which focus on transparency, professionalism, respect, and protecting confidential information.
This document discusses building a social portal using IBM Portal and Connections. It describes how a social portal can provide a consistent user experience, act as a collaboration hub by surfacing social content from Connections, and display appropriate social content contextually to users. Key benefits of a social portal include faster responses to customers/employees, knowledge sharing and usage, increased customer loyalty and engagement, easier access for new users through communities, and improved productivity. The document outlines how IBM Portal provides dynamic, personalized multichannel web experiences while IBM Connections enables social collaboration through features like profiles, communities, files, and activities. Together they can power a contextual, socially-infused, personalized portal.
The next generation of collaborative work will be defined by a shift from information handling to interaction management and socialization. Social software seems an unlikely example for enterprise collaboration initially, but networks allow tapping into collective coworker knowledge better than previous approaches. Communities form organically in social networks, connections are stronger, and adoption is faster due to ease of use. While past technologies like groupware and portals improved collaboration, social software facilitates user-driven interaction and knowledge-sharing.
Montressa L. Washington gave a presentation on using crowdsourcing, collaboration and Web 2.0 tools to enhance project management. She discussed how Enterprise 2.0 allows for new collaboration patterns through tools like wikis, blogs and social networks. Examples were given of how crowdsourcing, collaboration and social media can be used in project management, such as using ideation platforms for crowdsourcing ideas and online communities to facilitate collaboration. Web 2.0 tools like social bookmarks and profiles can also help with knowledge sharing and finding expertise.
The document introduces government agencies to the opportunities and best practices of using social media, also known as Web 2.0. It explains that social media allows two-way engagement with target communities rather than just targeting audiences. It provides examples of popular social media tools like blogs, wikis, Facebook, YouTube and Twitter. Early government adopters have learned that agencies should use social media to strategically engage citizens, address misinformation, and share content in digestible formats. Building online communities requires a long-term commitment beyond one-off experiments.
This document contains a lesson plan on information and communication technologies (ICT) for senior high school students. It includes objectives, directions for various activities, content on topics like the evolution of the web from Web 1.0 to 3.0 and features of Web 2.0. Trends in ICT like convergence, social media, and mobile technologies are also discussed. The lesson aims to help students understand how ICT has improved lives and assess their knowledge through matching, short answer, and true/false questions.
BLOOM Social Media: Navigating the Social Technology LandscapeDifferent Spin
Report author: Miranda Man, Social Business Strategist at BLOOM. Are you confused by social technology? Do you know your social media listening tools from your engagement tools? What is the difference between Yammer and Jive? How can I use these tools in my business?
To help, we are pleased to announce that we have written a report that provides an overview of a number of social tools. In this report, we have outlined use cases, case studies and key functionality. We will be looking at technology in the context of Social Business Intelligence (the progression from Social Media Marketing) and Enterprise 2.0.
In this research we focuses on the revolution that is changing the World Wide Web, electronic commerce, and business in general. Web 2.0 is the term used to describe the wave of change in business models and in Web site functionality that has transformed the online landscape. Most likely, you are already familiar with popular Web 2.0 applications such as Facebook or Wikipedia.
Web 2.0 introduces unprecedented ways to connect to friends, share knowledge with your colleagues, or collaborate with a team of engineers 5,000 miles away, and many of today’s companies cannot afford to miss this trend.
Most young people entering the workforce have grown accustomed to using Facebook or Twitter for their communication needs. With Web 2.0 providing a new set of capabilities for individuals and businesses, an understanding of how they can be applied can be very helpful. Being able to understand and apply these emerging capabilities and strategies that are associated with Web 2.0 is a highly marketable skill.
Relevant information was collected from trusted internet sources and some papers which is published in well-known conferences.
Email was once the transformative technology that made it easier for people to work together, but email created silos. Intranets attempted to bridge these silos, but the technology did not fundamentally transform the enterprise. What’s the missing link? Social. The result? A secure social networking platforms designed for the enterprise.
Download “When Collaboration Meets Community” and discover why enterprise collaboration must be social. Inside this two-page eBrief, discover how enterprise social:
Enables faster innovation
Creates better group dynamics
Puts power in knowledge
For more information, please visit http://www.tibbr.com/
1. The document discusses information and communication technologies (ICT), including the evolution of the World Wide Web from Web 1.0 to Web 2.0 to Web 3.0.
2. Key features of Web 2.0 are discussed, such as folksonomy, rich user experience, user participation, and mass participation.
3. Current trends in ICT are also summarized, including convergence, social media, mobile technologies, and assistive learning tools.
Wiring the Pentagon with Web 2.0 to Transform the Defense Acquisition Enterprise. DoD needs to once again harness the power of Internet technologies to develop and field the next generation of defense systems. Web 2.0 empowers users to collaborate, create resources, share information, and integrate capabilities in a distinctly different way from static Web sites. Published in Defense AT&L Magazine, Mar/Apr 2010.
Social computing has the potential to be much more than just web 2.0 for business. It shifts value from ownership and institutions to experience and communities. Social computing empowers individuals through one-to-many and many-to-many connections. When adopted, it can increase productivity, engagement, collaboration and knowledge sharing among employees. Companies should embrace social computing by understanding individuals' needs, nurturing enthusiasts, and allowing participation to drive critical mass in communities.
L1 Introduction to Information and Communication Technology.pptxEm Magallon
This document discusses key topics in information and communication technologies (ICT), including how ICT affects everyday life, differences between online platforms and content, features of Web 2.0 and Web 3.0, and trends in ICT. Specifically, it covers the evolution from static Web 1.0 pages to dynamic Web 2.0 pages that engage users, as well as the future vision of semantic Web 3.0 where machines can understand user preferences. The document also outlines several ICT trends like technological convergence across devices, the rise of social media, growing use of mobile technologies, and assistive media to help those with impairments.
Updated_L1 Introduction to ICT PDF.pdfssuser4dd301
This document provides an overview of information and communication technologies presented by Fernando A. Belarmino, an ICT professor. It discusses how ICT affects everyday lives through online platforms, sites, content, trends, and the evolution of the World Wide Web from Web 1.0 to Web 3.0. The document outlines the objectives of the lesson which are to improve knowledge of ICT's impact, compare online platforms and content, understand features of Web 2.0, understand the future of the web through Web 3.0, and learn trends in ICT. It also discusses concepts like input/output, storage, the computer cycle, and definitions of technology, ICT, and applications of ICT in different industries.
L1 introduction to information and communication technologyLevie Catalbas
This document discusses information and communication technologies (ICT). It begins by introducing ICT and how it deals with using various communication technologies. It then discusses the evolution of the World Wide Web from static Web 1.0 pages to dynamic Web 2.0 pages that allow for user interaction and participation. Key features of Web 2.0 like tagging and software as a service are explained. The document concludes by discussing the goals of Web 3.0 to have machines understand user preferences and deliver personalized content along with some challenges of implementing Web 3.0.
Enterprise Social Media: Trends and Best Practices in Adopting Web 2.0 in 2008white paper
The document discusses trends in enterprise social media adoption in 2008. Key findings include:
1) Employers are becoming more open to allowing social media participation for business purposes, with 69% allowing it in 2008 compared to 37% in 2007.
2) Employers are finding benefits to using social media like building their brand, improving communication, and increasing consumer engagement.
3) Some employers are using internal social networks rather than public sites like Facebook, while others use external or blended networks.
This document discusses Enterprise 2.0 and social software in business contexts. It provides an overview of key concepts like collaborative software, social software, and Enterprise 2.0. Enterprise 2.0 refers to using social software platforms within companies to improve information management, collaboration, and knowledge networks. The document includes sections on social patterns, potential applications of these tools, examples of companies using these approaches, and best practices for implementation.
This document discusses how information and communication technologies (ICT) affect everyday lives through online platforms, the evolution of the World Wide Web, and trends in ICT. It explains that ICT deals with using communication technologies like mobile phones and the internet to locate, save, send and edit information. The document outlines the differences between Web 1.0, static pages, and Web 2.0 which allows for dynamic content and user interaction. It also discusses the future of Web 3.0 and challenges it may face in having machines understand users' preferences. Finally, the document covers trends in ICT convergence on similar goals, the rise of social media and mobile technologies, and assistive media for visual/reading impairments.
This document discusses how information and communication technologies (ICT) affect everyday lives through online platforms, the evolution of the World Wide Web, and trends in ICT. It explains how Web 1.0 involved static pages, while Web 2.0 allows for dynamic content and user interaction. Features of Web 2.0 like tagging and software as a service are outlined. The document also discusses the goals of Web 3.0 in having machines understand users to deliver personalized content, though there are challenges. Emerging trends like technological convergence, social media, mobile technologies, and assistive media are also summarized.
L1 Introduction to Information and Communication Technology.pptxJanineBatungbakal2
This document provides an introduction to information and communication technologies (ICT). It discusses the evolution of the World Wide Web from static Web 1.0 pages to dynamic Web 2.0 pages that allow user interaction and participation. Key features of Web 2.0 like tagging and reviewing are described. The document outlines the goals of Web 3.0 to have machines understand user preferences to deliver personalized content along with challenges. Emerging trends in ICT like convergence, social media, mobile technologies, and assistive media are also summarized.
Similar to Introduction to Social Computing - Book Chapter (20)
Identifying Measures to Foster Teachers’ Competence for Personal Learning Env...Zaffar Ahmed Shaikh
Personal learning environment (PLE) is a learner centered and controlled environment where learner constructs knowledge socially and collaboratively with the help of knowledgeable peers, mentors, and teachers. Teacher, being the most knowledgeable other in this environment, has to develop a strong and multifunctional association between the learner and the PLE. However, in real world scenarios, this is not the case as teachers’ current competencies are not sufficiently developed to provide desired results. A major reason for this inefficiency is the unawareness of the required roles that a teacher has to play in such environments. Our study is aimed at identifying measures to foster teachers’ competence in PLE conceived teaching scenarios. We used the modified version of policy-Delphi in which we worked with 34 international experts who are either associated with PLEs in one of the four dimensions: teachers, researchers, designers, or practitioners. These experts reviewed a 10-item teachers’ PLE competency developing measures list, which we developed through an exhaustive literature review. As per Delphi procedure, the consensus on measures list was achieved in three rounds. During the process, participants collaboratively modified measures list at length and extended list from 10 items to 16 items. Based on the findings, we argue that institutional support is of prime importance to improve teachers’ PLE competence.
Higher Education in Pakistan: An ICT Integration ViewpointZaffar Ahmed Shaikh
1) The study surveyed 30 higher education experts in Pakistan using a modified Delphi method to understand their views on the role of information and communication technologies (ICTs) in shaping the future of Pakistan's higher education system.
2) Results showed significant gaps in current ICT demand and supply, usage, and ICT-related problems in higher education. Participants saw great potential for ICT to play a crucial role in developing Pakistan's higher education system but noted obstacles like poor infrastructure and lack of resources.
3) Participants suggested that developing an effective and robust ICT policy, increasing funding, providing training and high-tech facilities, and setting clear targets and guidelines could help integrate ICT successfully and improve higher education in
Presentation: Higher Education in Pakistan: An ICT Integration ViewpointZaffar Ahmed Shaikh
This document summarizes a study examining challenges in integrating information and communication technology (ICT) into Pakistan's higher education system. A literature review found that ICT can improve education but its use faces barriers like lack of infrastructure and policy. The study used a Delphi method survey of 30 experts to evaluate ICT issues. Findings showed current ICT use is around 50% of potential and barriers include uneven ICT distribution and lack of funding. Recommendations include improving ICT skills, generating financial support, and developing a robust long-term ICT policy and implementation plan.
Presentation: ZPD Incidence Development Strategy for Demand of ICTs in Higher...Zaffar Ahmed Shaikh
The document outlines a strategy for developing incidence of information and communication technologies (ICTs) in higher education institutions in Pakistan. It discusses relevant literature on ICT adoption in education and the concept of zone of proximal development (ZPD). A Delphi study was conducted to identify ZPD gaps in various dimensions of ICT use. The strategy proposes recommendations in six areas: using ICT for teaching and learning, gaining student attainment, improving teaching skills, managing and sharing information, partnerships and training, and connectivity and access. The goal is to provide guidance to higher education authorities on integrating ICT and improving learning outcomes.
Usage, Acceptance, Adoption, and Diffusion of Information & Communication Tec...Zaffar Ahmed Shaikh
This document summarizes a study that measured critical factors related to the usage, acceptance, adoption and diffusion of information and communication technologies (ICTs) in higher education institutions in Pakistan. The study used the Delphi method to analyze differences in perceptions among higher education stakeholders. It found a significant "zone of proximal development gap" in ICT usage, acceptance and adoption in Pakistani institutions compared to developed nations. However, it did not find significant differences in perceptions regarding issues like ICT demand and supply or challenges to ICT integration. The study recommends its findings be considered in designing ICT policies for higher education in Pakistan and other developing countries.
Role of ICT in Shaping the Future of Pakistani Higher Education SystemZaffar Ahmed Shaikh
This study examined the challenges faced by the Pakistani higher education system (HES) in integrating information and communication technology (ICT); it aimed at understanding ICT needs, measuring the increase in ICT demand, determining the relationship between ICT and HES performance, and understanding how the HES copes with the challenges of implementing ICT. The results of these analyses were used as the basis to suggest solutions. The normative Delphi method was applied to evaluate a sample of 30 HES experts randomly selected from urban and rural areas of Pakistan by administering a literature-based 35-item questionnaire. The
experts revealed significant gaps in ICT demand and supply, ICT use, ICT-based higher education problems, and reasons for delays in ICT integration and provided suggestions for developing ICT-driven HES in Pakistan. This
study’s findings suggest that an effective and robust HES ICT policy could greatly improve the status of the Pakistani knowledge-based economy, thus helping establish ICT policy and planning, administration, and integration at the higher education level.
The aim of this paper is to discuss the changing roles and competencies of a teacher in context of prevailing developments accomplished by the vast availability of social software, which have made easy the development of Personal Learning Environments (PLEs). This has been accomplished by an in-depth review of the literature on teachers’ socially situated competencies and roles with regard to the tasks and guidance they provide to students shape their PLEs. Review process provides an insight of PLE research studies, constructivist learning theories, and teacher changing roles. The results of this study outline the roles that portray the importance of teacher competencies as role in Planning and Design, Instruction and Learning, Communication and Interaction, Management and Administration, and Use of Technology.
This chapter will introduce you to the field of science known as Network Theory and tell you about the major researches that took place since its conceptualization. Since the course in question is social computing the chapter is written in a way to give examples and illustrations which mostly relate to social computing. It also contains theories and information which are mostly related to network theory and have some or no relation to social computing. But the basic purpose of this chapter is to explain Network theory and its applications in the field of social computing.
This document provides an introduction to network theory and its major concepts and research areas. It discusses what networks are, common network models, and seminal works that helped establish the field, including sociograms, the small world phenomenon, and theories of strong and weak social ties. Major areas of research covered include distance and effective distance between nodes, the size of interpersonal environments, degrees of separation, and how weak ties help integrate social systems. The document concludes with brief sections on network optimization and analysis.
This document provides an introduction to social computing, covering its history from early social software to modern applications enabled by Web 2.0 technologies. It discusses key concepts in social computing design and models of social behavior, comparing crowd sourcing to outsourcing. The document is intended to provide learning objectives on social computing topics.
The document discusses infrastructure requirements for social computing applications, including common tools like Ajax, podcasts, Yahoo Widgets, Python, and Perl. It also discusses social computing platforms like Ruby on Rails, MySQL, and Microsoft SharePoint. Microsoft SharePoint is highlighted as a platform that can be used to build eight social computing applications within one system, including features like My Sites, Team Sites, blogs, people search, wikis, community sites, announcements, and internal/external groups.
The document summarizes the K-nearest neighbor (KNN) algorithm. KNN is a memory-based algorithm that finds the K training samples nearest to a query point and predicts the query's classification based on the majority classification of its neighbors. The summary explains:
1) KNN measures the distance between query points and training samples to classify new objects based on the majority category of its K nearest neighbors.
2) To make a prediction, KNN determines K, calculates distances between the query and all training points, identifies the K nearest neighbors, collects their classifications, and predicts the query's classification based on the majority of its neighbors.
3) An example is given where KNN predicts the winner of an
Trust Based Recommendation Systems For Tourism System Zaffar Ahmed ShaikhZaffar Ahmed Shaikh
The document describes a trust-based recommendation system algorithm for tourism based on random walks on a voting network. The algorithm takes as input a voting network with positive and negative voter nodes and performs a random walk from a source node, terminating when a voter node is reached. It outputs the sign of the difference between the probability of reaching a positive voter vs. a negative voter as the recommendation. The algorithm assigns values to non-voter nodes to solve the system and outputs the sign of the value assigned to the source node as the recommendation.
The document discusses infrastructure requirements for social computing applications, including common tools like Ajax, podcasts, Yahoo Widgets, Python, and Perl. It also discusses social computing platforms like Ruby on Rails, MySQL, and Microsoft SharePoint. Microsoft SharePoint is highlighted as a platform that can be used to build eight social computing applications within one system, including features like My Sites, Team Sites, blogs, people search, wikis, community sites, announcements, and internal/external groups.
Collaborative filtering analyzes data from multiple sources to develop profiles of people with similar tastes. It finds similarities between users based on their preferences and provides recommendations based on the preferences of similar users. Collaborative filtering requires a large amount of stored user data to make reliable recommendations, and the more users in the population, the more useful the recommendations will be. However, with small datasets it can produce false connections or poor predictions.
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
1. Chapter 1 Introduction to Social Computing
during that decade that still persists in major
Social Computing portion of the world. There requires a heavy
Social computing is a rapidly growing and transfer of larger amounts of data in most
constantly evolving technology that is aimed social computing applications that tend to be
at increasing communication, encouraging interactive with multi media and also manage
collaboration, and enhancing productivity messaging. AOL step forward and provided
among people and resources. Social such interactive services to the mass public
computing applications or Web 2.0 are built for the first time in mid-1990s.
on a range of advanced and supporting
Later on during late 1990s, the problem was
technologies that enhance collective action
sorted out, and computer industry embraced
and interaction which currently dominates
a huge increase in internet bandwidth and
the Web (Parameswaran &
computing capacity of computers. This
Whinston 2007).
achievement also impacted on software
Social computing applications are categorized industry, and interactive web sites and instant
into social media, social bookmarking, and messaging tools started to show up.
social networks categories as identified by the Companies started to invest in e-commerce
continuing Web 2.0 trend (Schwartz et al. sites and online shopping shops. This resulted
2009; Amer-Yahia, 2009). Each of these new and unique social applications such as
categories has been embodied by various Wikis, news forums, and blogs to appear
social software and web sites. Some of the online and people started to share their
best-known and equally famous social web viewpoints, discussion, and experiences.
sites that dominate the web are Facebook,
The beginning of 21st century witnessed a
YouTube, Twitter, Wikipedia, Delicious, and huge change and brought social computing to
LinkedIn.
the forefront of the citizens of digital age.
More and more people started using social
History of Social Computing
software that has grown into what we know
The ideas and principles of social computing today.
have been around in web communities for
long time. Discussion forums and emails were Social Software
the primary means of discussion and
Social software is the combination of so many
communication as early as in 1980s. tools and services that transformed static web
Originally, email was thought as providing
into read/write web and that enabled people
people ways of communication; but later on, to connect and collaborate more easily.
it provided a significant business value. Today,
some people consider social computing It can be defined as a
applications as a tool for goofing off or having
fun (Schwartz et al. 2009). 1. means of collaborating, and building
purpose-aware communities online,
The rise of the personal computing era
encouraged people and enterprises to get 2. software that supports and derives added
personal computers as to increase their value from human social behaviour,
communication with remote offices and 3. tool that can be syndicated, shared,
customers. The cost of forwarding bits blended, and can be reused again and
through Internet became major problem again.
6
2. Chapter 1 Introduction to Social Computing
Characteristics of Social Software this for their personal satisfaction, gaining
current knowledge, or learning from scholarly
1. Some of the characteristics listed below
arguments.
are those that distinguish social software
from traditional software. Building social computing applications
requires understanding the insight of social
2. Easily navigable: easy content creation
behavioural theories and social software
and sharing
design considerations that will be
3. Peer to peer networking and incorporated in those applications, such as,
communication how participation of people is enabled, what
type and age group of people is targeted, how
4. Online collaboration you allow people to control web site,
understanding psychology of participants that
5. Adding metadata such as tags, comments
whether people just access the website for
to online content and blog entries
viewing or information gaining purpose or
6. Conversations: distributed and in real they really want to participate in collaborative
time activities, creating balance between
constraints and creativity, is it an open access
7. Bottom up community development site or built for a specific region, etc.
8. Capitalizing on the wisdom of crowds It is also good to know prior to building social
9. Easy handling of malicious users computing applications what principles and
features define a social system. Some
10. Transparent transactions common social computing applications are
discussed below:
11. Easy creation of personal learning spaces
12. Portability Tagging
Keywords or short key phrases that define
13. Read/write web what your digital object is all about are simply
14. Overcoming Barriers of Distance and Time termed as Tags in social computing
community. Tagging is adding tags on your
Social Computing Applications photos, bookmarks, files, and other content
(Strohmaier et al., 2009). These are the ways
The main objective of creating social
of freely describing resources. Tagging help
computing applications is to cater the social
computer users easily discover and browse
needs of digital natives. There are many social
content over the internet.
computing applications that are built on this
concept such as Wikis, Blogs, News forums, There can be an infinite number of viewpoints
Prediction Markets, Recommender, through which a digital object can be seen
Reputation management system, etc. This is and interpreted (Jiang et al., 2010). So, the
because the nature of issues that an Internet more the number of relevant labels on an
site or public-facing corporate sites solve is object, the more the object would be
different than the issues faced by employees searchable on the web. Sometimes, we don’t
of an enterprise using internally available find a suitable name for our content and
resources. It means that people participating system automatically generates its name such
in blog post and participation in discussion do as AE000098.jpg. Here, tagging allows us to
6
3. Chapter 1 Introduction to Social Computing
manage our content in a manner that lets the training data. Hybrid collaborative filtering
machine find it [3]. Tagging allows users to combines model-based and memory-based CF
choose the labels that match their own needs algorithms.
and tastes, which greatly reduces the
cognitive efforts [2]. According to recent user Prediction Markets
studies, users do annotate their photos in Prediction markets are based on the principle
order to promote the public attention degree of wisdom of the crowd that more accurate
[2]. Tagging is supported in almost any new prediction will emerge from the betting
Web application involving user participation, activity of the collective. The other terms used
e.g. Flickr, YouTube, Amazon, etc. in place of these markets are information
markets or event futures (Servan-Schreiber et
Collaborative Filtering al. 2004).
Collaborative filtering is the method of getting
personalized recommendations by computing These markets reward accurate predictions
through wins and punish inaccurate
user- or item-based similarity profiles (Chen
et al. 2010). It analyzes data to develop predictions through losses (Wolfers &
Zitzewitz, 2004).
profiles of people who are related with similar
tastes and spending habits (Sarwar et al., The type of contracts in prediction markets
2001). are basically divided into three categories,
such as: Winner-take-all contract, Index
• It is based on ‘word-of-mouth’ idea.
Contract, and Spread Betting.
• It gives reliable recommendations.
Reputation Management Systems
• It needs a lot of stored data for reliable
Reputation management systems or trust-
recommendations for the active user.
based reputation mechanisms establish a
• The bigger the size of population, the healthy and efficient collaboration among
more useful and effective anonymous online users who have not prior
recommendations will be produced by the knowledge about each other. They construct
system (Smart Mobs) large-scale word-of-mouth networks
(Dellarocas, 2005; Tennie et al., 2010).
• Small data – shows false connections or
poor predictions of active user tastes The primary objective of trust and reputation
management is to enable transparent and
• Suffers from cold start problem – efficient transactions between users where
database needs to be populated first. cooperation is compromised by post
contractual opportunism or information
Basically there are two types of collaborative
asymmetries (Kreps, & Wilson, 1982).
filtering techniques, such as Memory-based
collaborating filtering and Model-based Social Computing Concepts &
collaborating filtering methods. Memory-
Design Principles
based collaborating filtering systems rely on
user or item profiles and sometimes use user Social computing concepts are built around
rating data for computing similarity, while four major areas that may overlap with each
Model-based collaborating filtering find other. Such as: social media, social
similar patterns or hidden factors based on
6
4. Chapter 1 Introduction to Social Computing
bookmarking, social networks, and social not constrain them from using creative
communication. features.
The important design principles which make The principle of sociability
success of social systems more likely are:
This principle is required to ensure and
embed social presence and collaboration
The principle of adaptability
among visitors and participants of social
This requires that social software is built on software.
small services that interoperate, connect
using open standards, and should be built The principle of connectivity
with open source software. So that people
The principle of connectivity is based on the
can adapt and evolve systems to suit their
idea that everything should influence
local needs (Dron, 2007).
everything else and there should nothing exist
http://www.ifets.info/journals/10_3/5.pdf).
in isolation (Dron, 2007).
The principle of evolvability
The principle of context
This principles encourages design of deferred
This principle ensures that social software
systems; easily decidable systems whose
must be built on the concept that it is a very
structure is not fixed.
valuable small part of a much greater whole
(Dron, 2007).
The principle of participation
The principle of participation requires that The principle of constraint
how participation of users is enabled, how
This principle requires that constraints must
users’ participation is guaranteed, what
be incorporated in social software and users
aspects are built in systems that encourage
should be aware of those constraints and also
participation (Dron, 2007).
know how to use them to enhance learning.
The principle of parcellation
The principle of scale
This principle ensures that systems are built
This principle tracks small and large
distinctly from each other, they are loosely
components in the system and ensures that
coupled and occasionally connected with each
the large should arise out of the small in an
other, and are ideal hierarchical niches that
endless cycle.
talk with each other.
The principle of trust The principle of understanding
The principle of trust ensures building of
psychology of user
reliable and harmless social software that This ensures that what user wants from social
identify reliability in people and systems, and software, and it should provide the user all
protects them from harm. collaborative and other social presence
features.
The principle of stigmergy
The Rise of Web 2.0
This principle ensures that social systems be
built on concept that guide users how to get There were times when people used to go to
maximum from them by using signs and do search engines and seek their requirements
6
5. Chapter 1 Introduction to Social Computing
by typing out search terms and taking great AJAX
care of the sequence and combination of
AJAX is web development technique for
terms. The term ‘Apple’ almost consistently
interactive Web applications. AJAX provides
reaped an ‘apple’ to all searchers across the
standard ways of dynamically interacting with
globe. The reason behind this consistency was
content to make dynamic requests to the
the non-gallant approach by search engines to
server without refreshing the full page.
optimize searches.
As time passed by search engine optimization Podcast
hit the market like a wave – soon enough A podcast is the collection of media files
every search engine company was working on (either audio or video) distributed and
SEO and search results began to change and released episodically over the internet using
become more specific and relevant almost syndication feeds for playback on portable
overnight. The proof is irrefutable and search media players and personal computers.
results have dramatically become highly
specific and more-so ‘targeted’. This is the Widgets
Web 2.0 paradigm, where search results are A widget, also known as gadget, snippet, or
highly specific, relevant, and geared towards flake, is web application software for the web
individual’s taste, interests, ideas, etc. installable and executable within a web page
The term Web 2.0 is often referenced as the by the web user.
web applications that facilitate collaborative
information sharing, interoperability, and
Python
user-centered design on the web in order to Python is a multi paradigm programming
provide better user experience. These sites language that integrates your work more
use technologies such as AJAX, JavaScript, quickly and reduces your maintenance costs
Widgets, Python, Perl, Flash, Silverlight, and by using automatic memory management of
REST to enhance their look and interaction. programming tasks.
These sites usually include blogs, wikis, news
forums, mashups, social bookmarking, social Perl
peer-to-peer networking sites, open source Perl (practical extraction and reporting
communities, photo and video sharing language) is a general purpose interpreted
communities, and more. programming language used for a huge
number of uses including system
Social Computing Enabling administration, Web application
technologies & Architecture development, GUI development, etc.
The architecture and technologies which
make social computing applications possible Ruby on Rails
in today’s collaborative environment are Ruby on Rails is an open source web
continuously evolving over time and will framework that lowers the barriers of entry to
continue to change and grow as new programming. It has made easy the powerful
capabilities become available on Internet web applications that formerly might have
(Parameswaran & taken weeks or months to develop.
Whinston 2007b).
6
6. Chapter 1 Introduction to Social Computing
MySQL an interface and the web service then
responds to the user's input.
MySQL is the most popular open source,
multi-user, and multithreaded SQL database
The Models of Social Computing
management system, developed, distributed,
and their Relevance to Behaviour
and supported by Oracle Corporation.
"The capacity of human communities to
Microsoft SharePoint evolve towards higher order complexity and
harmony through such innovation
Microsoft SharePoint is a unique social
mechanisms as differentiation and
computing application that has taken a
integration, competition, and collaboration”.
unique approach of designing 8 applications
–
using one platform. Here are 8 ways users can
extend SharePoint’s out-of-the-box -Wikipedia
capabilities to better fit their social computing
vision. People in Pakistan are leading with example
when it comes to enhancing interaction of
JavaScript local and overseas users. This is exactly the
kind of insight, which will encourage and
JavaScript was designed to add interactivity to
enable new users to foster tangible focus on
HTML pages. It allows developers to program
problems related to the socio-economic uplift
code that would be downloaded as part of the
of the nation.
page’s content and run inside user’s browser.
One of the major models that have come to
SilverLight face is collaboration. Defined as “a recursive
Microsoft Silverlight is a popular web process where two or more people or
application framework used to build and organizations work together toward an
deliver cross-browser and cross-platform intersection of common goals,” (Thomas,
experiences on the web. It allows web 2010). Collaboration has been one of the key
developers to create powerful user interfaces elements for the success of the so-called
using an XML-based language called XAML, social community paradigm. The extent to
JavaScript, AJAX, and .net. which communities have aligned themselves
in organized and connected ways to
REST coordinate with each other is immense.
A common architecture used for getting
The new paradigm is of working in
information content from a social computing
collaboration and reaping the rewards of
application by reading web pages that contain
synergy in the last year all great enterprise
XML data files that describe and include
formation has been through social means.
desired content.
People have begun to change their online
Web Services behavior as a result of the social computing
Web Services are a collection of open influence on their lives. The Largest enterprise
protocols developed to interact with users online have been social:
and exchange their data between
-Democratic media website
applications. Here, a user enters data through
-Online community
6
7. Chapter 1 Introduction to Social Computing
-Most comprehensive encyclopedia
-Video archive
-Movie review database
-Auction market
-Travel resource
Crowd Sourcing Vs Out Sourcing
Although crowd sourcing and out sourcing is a
References
phenomenon which has existed since many a
Bo Jiang, Yun Ling, Jiale Wang , "Tag
year or perhaps even centuries; from the day
Recommendation Based on Social Comment
of the trade. It is recently that has been Network ", JDCTA: International Journal of
revolutionized with the advent of increased Digital Content Technology and its
computer use. Applications, Vol. 4, No. 8, pp. 110 ~ 117,
2010
Not only has this trend been revived, it has
been made very easy. Before we get into Chrysanthos Dellarocas: Reputation
examples and uses of these two concepts, we Mechanism Design in Online Trading
must start of with defining each of them. Out Environments with Pure Moral Hazard.
sourcing as the name suggests is giving out Information Systems Research 16(2): 209-230
(2005)
part of the work, usually which is not the core
but a support function, to a group or entity Dron, J. (2007b). Designing the undesignable:
for which it acts as a core function or a main Social software and control. Educational
activity in line with its stated area of activity. Technology & Society, 10(3), 60-71.
http://www.ifets.info/journals/10_3/5.pdf
An example of this in the conventional way is
the call center boom in parts of India where Kreps, D. M., and Wilson, R. “Reputation and
the customer service work was out sourced. Imperfect Information,” Journal of Economic
The examples of out sourcing on the Internet Theory (27:2), August 1982, pp. 253-279.
are plenty with online customer support or
M. Strohmaier, C. Körner, and R. Kern. Why
payment systems like Pay pal. do users tag? detecting users’ motivation for
tagging in social tagging systems. Technical
report, Knowledge Management Institute -
Graz University of Technology, 2009.
Now we come to crowd sourcing. Crowd
sourcing is the activity of out sourcing work to
Parameswaran, M., and A.B. Whinston
the crowd in general. People on the Internet (2007a), “Social Computing: An Overview”,
who volunteer, amateur enthusiasts, for the Communications of the AIS, forthcoming.
work out of interest. This is separate from the
work of out sourcing as the people are not Parameswaran, M., and Whinston, A. B.
identifiable and are anonymous. An example (2007b) “Research Issues in Social
Computing,” Journal of AIS (8:6), June 2007,
of this is the freelance web sites like Essay
pp. 336-350. ProbabilitySports.com,
Writers.
6
8. Chapter 1 Introduction to Social Computing
Brian (2004) 'Prediction Markets: Does Money
Matter?', Electronic Markets, 14: 3, 243 —
251
S. Amer-Yahia, L. Lakshmanan, and C. Yu,
“Social Scope: Enabling Information Discovery
on Social Content Sites”, In CIDR, 2009.
Sarwar, B. M., Karypis, G., Konstan, J. A., and
Reidl, J. 2001. Item-based collaborative
filtering recommendation algorithms. In
Proceedings of the World Wide Web
Conference (WWWC10). 285–295.
Schwartz, B, Ranlett, M & Draper, S 2009,
‘Social Computing with Microsoft SharePoint
2007: Implementing Applications for
SharePoint to Enable Collaboration and
Interaction in the Enterprise’, John Wiley and
Sons.
Servan-Schreiber Founder of
NewsFutures.com and Leading Provider,
Emile, Wolfers Assistant Professor of
Economics, Justin , Pennock Senior Research
Scientist, David M. and Galebach Founder of
Tennie C, Frith U, and Frith CD., 2010.
Reputation management in the age of the
world-wide web.
Thomas, D. 2010. Practice Notes:
Collaborative Software Design: the benefits,
Health Care and Informatics Review Online,
2010, 14(1), pg 24-28, Published online at
www.hinz.org.nz ISSN 1174-3379
Wolfers, J. and Zitzewitz, E. (2004) ‘Prediction
Markets’, Journal of Economic Perspectives,
Spring.
Zhimin Chen, Yi Jiang, Yao Zhao: A
Collaborative Filtering Recommendation
Algorithm Based on User Interest Change and
Trust Evaluation. JDCTA 4(9): 106-113 (2010)
6